ATLAS HTCondor-CE ping with SCITOKEN

host: 
port: 

HTCondor basic info

Test condor_ping with SCITOKEN credentials

11/24/24 01:54:47 recognized WRITE as authorization level, using command 60021.
11/24/24 01:54:47 attempt to connect to <[2001:1458:d00:41::100:4a1]:9619> failed: Connection refused (connect errno = 111).
ERROR: couldn't locate ce666.cern.ch!

Test condor_ping with GSI credentials

This can't work with recent HTCondor-CEs that no longer support GSI

condor_ping result:
11/24/24 01:54:47 recognized WRITE as authorization level, using command 60021.
11/24/24 01:54:47 attempt to connect to <[2001:1458:d00:41::100:4a1]:9619> failed: Connection refused (connect errno = 111).
ERROR: couldn't locate ce666.cern.ch!

Test condor_ping with SSL credentials

This could work only with recent HTCondor-CEs, but only with special individual SSL mapping for certificate subject:

SSL "/DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac" unix_account
condor_ping result:
11/24/24 01:54:47 recognized WRITE as authorization level, using command 60021.
11/24/24 01:54:47 attempt to connect to <[2001:1458:d00:41::100:4a1]:9619> failed: Connection refused (connect errno = 111).
ERROR: couldn't locate ce666.cern.ch!

Client credentials

Token:
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "ce666.cern.ch:9619",
    "condor://ce666.cern.ch:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732409687,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.cern.ch/",
  "exp": 1732755287,
  "iat": 1732409687,
  "jti": "9e12d366-3b25-42e5-a48b-07456ac3c32d",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}

Proxy:
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256/CN=416720981
issuer    : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256
identity  : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
type      : RFC3820 compliant impersonation proxy
strength  : 2048
path      : /tmp/x509up_u48.prd.htcondor.32382
timeleft  : 11:59:57
key usage : Digital Signature, Key Encipherment
=== VO atlas extension information ===
VO        : atlas
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
issuer    : /DC=ch/DC=cern/OU=computers/CN=atlas-auth.web.cern.ch
attribute : /atlas/Role=production/Capability=NULL
attribute : /atlas/Role=NULL/Capability=NULL
attribute : /atlas/alarm/Role=NULL/Capability=NULL
attribute : /atlas/cz/Role=NULL/Capability=NULL
attribute : /atlas/team/Role=NULL/Capability=NULL
attribute : testattr = testvalue (atlas)
attribute : nickname = vokac (atlas)
timeleft  : 11:59:57
uri       : voms-atlas-auth.app.cern.ch:443